Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:0748

Опубликовано: 07 мая 2025
Источник: rocky
Оценка: Important

Описание

Important: container-tools:4.0 security update

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • runc: file descriptor leak ("Leaky Vessels") (CVE-2024-21626)

A Rocky Enterprise Software Foundation Security Bulletin which addresses further details about the Leaky Vessels flaw is available in the References section.

  • golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)

  • golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
aardvark-dnsx86_6438.module+el8.9.0+1445+07728297aardvark-dns-1.0.1-38.module+el8.9.0+1445+07728297.x86_64.rpm
buildahx86_647.module+el8.9.0+1445+07728297buildah-1.24.6-7.module+el8.9.0+1445+07728297.x86_64.rpm
buildah-testsx86_647.module+el8.9.0+1445+07728297buildah-tests-1.24.6-7.module+el8.9.0+1445+07728297.x86_64.rpm
cockpit-podmannoarch1.module+el8.9.0+1445+07728297cockpit-podman-46-1.module+el8.9.0+1445+07728297.noarch.rpm
cockpit-podmannoarch1.module+el8.9.0+1445+07728297cockpit-podman-46-1.module+el8.9.0+1445+07728297.noarch.rpm
conmonx86_642.module+el8.9.0+1445+07728297conmon-2.1.4-2.module+el8.9.0+1445+07728297.x86_64.rpm
containers-commonx86_6438.module+el8.9.0+1445+07728297containers-common-1-38.module+el8.9.0+1445+07728297.x86_64.rpm
container-selinuxnoarch3.module+el8.9.0+1445+07728297container-selinux-2.205.0-3.module+el8.9.0+1445+07728297.noarch.rpm
container-selinuxnoarch3.module+el8.9.0+1445+07728297container-selinux-2.205.0-3.module+el8.9.0+1445+07728297.noarch.rpm
critx86_643.module+el8.9.0+1445+07728297crit-3.15-3.module+el8.9.0+1445+07728297.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
больше 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

oracle-oval
больше 1 года назад

ELSA-2024-2245: buildah security update (MODERATE)

oracle-oval
больше 1 года назад

ELSA-2024-2193: podman security update (MODERATE)

oracle-oval
почти 2 года назад

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

CVSS3: 5.3
ubuntu
около 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.